Schedule

This schedule may be subject to changes …

Day One (1) – May 29, 2015
Track A Track B Tack C
8:00AM Registration
8:30AM Opening/Morning KeyNote -Javier Hernandez:  Hardware Hacking, My first CON Badge
9:00AM Jose L Quiñones -Drone Wars: Weaponizing your “drone” Carlos Perez -Abusing Active Directory in Post-Exploitation Jose A. Arroyo -Social Network Analysis from a SE perspective
10:00AM Morning Break
10:30AM Jim Kenedy -How to secure a windows network like a boss Edgar Perez – Free Software Licensing Claudio Caracciolo -Hardening Networks, Servers & Apps with Latch Community Edition
11:30PM Paul Coggin -Hijacking Label Switched Networks in the Cloud Jose R. Fernandez -Fun with Tor: How anonymity services complicate actor attribution Jaime A. Restrepo -Hackeando carros en Latinoamérica
12:30PM Lunch
1:30PM Key Note: Lcdo. Fernando Cervoni: Don’t get Caught, know the Law!
2:30PM Walter J. Cervoni, CPP – The Chasm – Security at a Crossroads Mitch Parker -Financial and Policy Challenges to Effective Information Security for Hospitals
3:30PM Afternoon Break — Coffee sponsored by GM Security Technologies
4:00PM Alvaro Andrade – BANKING SECURITY THREATS: “Past, Present and Future of Banking Cyber Attacks” Jose Padilla -JSON web tokens Caracciolo Claudio -El mercado del Malware en los store para Android
5:00PM Omar Santos – Are “Branded” Vulnerabilities Helping Make the Internet a Better Place?
6:00PM Closing / Cocktail
Day Two (2) May 30, 2015 (4 hour workshops)
Workshop A Workshop B Workshop C
9:00AM Registration
9:30AM Jose Quiñones – Linux for Security Professionals —— Requirements: Boot Media or VM with Linux (Kali, or Ubuntu) Carlos Perez – Powershell for Security Professionals —–Requirements: Windows 7 Up to date or better. Angel Trinidad  – RAM Analysis —- Requirements: Sample Files – Here
10:30M Break
 1:00PM  Closing/Meeting